Seven critical success factors for a safe and compliant “Cloud First” strategy - Solvinity (2024)

Seven critical success factors for a safe and compliant “Cloud First” strategy

Seven critical success factors for a safe and compliant “Cloud First” strategy - Solvinity (1)

17 November 2021

Blogs

The Cyber Security Council (CSR) has been alerting the Netherlands to its digital vulnerability for many years. As already became clear from our Security Awareness investigation, the most basic security measures are often not taken. In respect of external threats, organisations increasingly aim their IT strategy at “online” environments. Which is fortunate, as the technologies used by people and countries that are up to no good will only become more and more advanced.

"Consider the fact that each security-related architectural choice also comes at a cost."

Seven critical success factors for a safe and compliant “Cloud First” strategy - Solvinity (2)

Stefan van den Brink

Cloud Consultant

And yet, when planning to move to the Public Cloud, organisations often first check whether an environment or application can run in the Public Cloud (does it work?) to only then investigate the information security aspect. This, while security and compliance should form the foundation for the applications to be built and the data to be controlled. After all, it will be far more difficult and costly to introduce security into your application stack and Cloud infrastructure through “reverse engineering”. Let alone the consequences and costs associated with a data breach. Hence, the following seven points of attention to take into consideration when improving your Cloud landscape’s security and compliance.

1) Responsibility

The services of Cloud Service Providers are, in fact, safe and are tested by external parties on a regular basis. The audit reports are accessible to all and offer you security up to the level to which the Cloud Service Provider (CSP) is responsible. However, the resources and data that you, as an organisation, contribute are, and will remain, your responsibility in accordance with the shared responsibility model. Ensure, therefore, that it is clear to you per service as to what CSP does and what you have to do yourself.

2) Divide and conquer

Breaking up monolithic applications into so-called microservices facilitates the intermediate improvement of a service and lessens the impact if the application is not available. This architectural concept can also be applied to security within the Public Cloud. Are you going to put all the data at a location with an access policy to all, or will you opt for a granular setup? Will you apply a minimal access policy to each file or folder? Consider this well in advance in order to substantially limit the impact of an unexpected data breach. The fact that each security-related architectural choice also comes at a cost is something to consider as well.

3)Compliance

As compliance is content dependent, each type of application or branch, for example, will have to meet different requirements. In this regard, be sure to list the compliance requirements that apply to your organisation, check which CSP services you wish to use to achieve your objectives and compare the one with the other.

4)Automation

Make a deliberate choice and opt for the full automation of security and compliance and include this in your “Cloud First” strategy. “Infra as code” offers significant advantages, such as cost savings, reduced error-proneness and a higher level of security and compliance. It will become easier, faster and therefore cheaper to go through audits and it will enable a faster and testable change and configuration management.

5)Security Guidelines

Cloud Service Providers offer a wide range of security services that will unburden you where information security is concerned. This is by no means a static whole; developments rapidly succeed each other and best practices are updated on a regular basis. Ensure that you continuously keep abreast of this knowledge which brings us to the following point: training.

"It is essential to ensure a continuous investment in knowledge and expertise."

Seven critical success factors for a safe and compliant “Cloud First” strategy - Solvinity (3)

Stefan van den Brink

Cloud Consultant

6)Training

Security and compliance are specialities that, when insufficiently controlled, can have a negative impact on the quality of information security and long-term costs. It demands the required technical knowledge and experience to make the choice that best suits the objectives of your organisation time and time again. Keeping the knowledge up to date is therefore essential. Not only from a security or compliance perspective but also from a cost perspective: every innovation could result in saving money or reveal that the previously chosen approach and tools could instantly make matters considerably more expensive. It is essential here to ensure a continuous investment in this knowledge and expertise.

In addition to the more technical knowledge and experience to ensure a good design and smooth implementation, there are the employees or clients that use the systems. Each organisation will benefit from employees who know how to work safely in the Public Cloud, who are aware of the risks and who know how to act if something still goes wrong unexpectedly. This is why you should invest in the education of your employees by, for example, conducting so-called phishing tests and exploring effective and accessible training modules that can be adapted to the needs of your organisation.

As safe as the strictest client

Maintaining a high level of expertise as well as keeping up with the fast developments make information security a complex affair for many organisations. If this is the case, it may appear more interesting to outsource this to a reliable and experienced partner instead of setting it all up and innovating in-house. A Managed Service Provider (MSP), with security as its key task, will accumulate many years of experience and will continue to learn and renew. The big added advantage here is that the portfolio of various MSP clients can enable the organisation to hitch a ride on the best practices: an MSP is as safe as its strictest client.

Want to know more?

View the or listen to our
podcast on SOC Compliance in Azure (Dutch).

Sign up for the Solvinity Newsletter

Receive the latest news, blogs, articles and events. Subscribe to our newsletter.

Subscribe

Other articles

more articles

More

Blogs

8 July 2019

Vulnerability management problems? Relax

With the summer holiday period approaching, taking time off from work to relax and recuperate is...

READ MORE

Blogs

28 November 2023

Preparing for DORA (and NIS2)

IT security within the ecosystem becomes a policy and strategic cornerstone for financial institutions. This article...

READ MORE

Blogs

25 June 2021

How do you automate public cloud deployments

Read in this blog by Daan Toes how to automate public cloud deployments to reduce errors,...

READ MORE

Seven critical success factors for a safe and compliant “Cloud First” strategy - Solvinity (2024)
Top Articles
Latest Posts
Article information

Author: Amb. Frankie Simonis

Last Updated:

Views: 6236

Rating: 4.6 / 5 (56 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Amb. Frankie Simonis

Birthday: 1998-02-19

Address: 64841 Delmar Isle, North Wiley, OR 74073

Phone: +17844167847676

Job: Forward IT Agent

Hobby: LARPing, Kitesurfing, Sewing, Digital arts, Sand art, Gardening, Dance

Introduction: My name is Amb. Frankie Simonis, I am a hilarious, enchanting, energetic, cooperative, innocent, cute, joyous person who loves writing and wants to share my knowledge and understanding with you.